certmichelin / RedscanLinks
☆34Updated 9 months ago
Alternatives and similar repositories for Redscan
Users that are interested in Redscan are comparing it to the libraries listed below
Sorting:
- Check robustness of your (their) Active Directory accounts passwords☆35Updated 4 months ago
- ansible roles to download and install empire (BC-Security),deathstar(byt3bl33der) and starkiller (BC-Security)☆24Updated 3 years ago
- Tools for offensive security of NetBackup infrastructures☆41Updated 2 years ago
- Ingest openldap data into bloodhound☆81Updated 4 years ago
- ☆18Updated last year
- Continuous kerberoast monitor☆45Updated last year
- Reproducible and extensible BloodHound playbooks☆44Updated 5 years ago
- A VS Code extension to preview XML nmap output☆44Updated 4 months ago
- Small python script wrapper for automating hashcat commands☆38Updated 4 years ago
- Python tool to find vulnerable AD object and generating csv report☆14Updated 3 years ago
- CyberWarFare Labs hands-on workshop on the topic "Detecting Adversarial Tradecrafts/Tools by leveraging ETW"☆49Updated 3 years ago
- Obtain a clean-cut architecture at the launch of a mission and run some tests ( subdomain search, fuzzing, make screenshots on a given pe…☆25Updated 2 years ago
- A cloud automation system for Red Teams based on Terraform and Ansible☆24Updated 4 years ago
- ☆54Updated 4 years ago
- autocrack adds queue support for hashcat cracking.☆41Updated 2 years ago
- ☆42Updated 3 years ago
- C# and Impacket implementation (here with Kerberos auth support) of PrintNightmare CVE-2021-1675/CVE-2021-34527☆29Updated 4 years ago
- Automated activity logging utility for Mythic C2 v3.0+ with Ghostwriter v3.0+☆19Updated 5 months ago
- ☆39Updated last year
- wordlists for password cracking☆28Updated 2 years ago
- Python tool to find vulnerable AD object and generating csv report☆26Updated 3 years ago
- Modified version of PEAS client for offensive operations☆41Updated 2 years ago
- Dump objects from .NET dumps.☆51Updated 3 years ago
- BloodCheck enables Red and Blue Teams to manage multiple Neo4j databases and run Cypher queries against a BloodHound dataset.☆17Updated 4 years ago
- Man in the middle for NLA enabled RDP in python☆15Updated 3 years ago
- Automation of Active Directory penetration testing tasks on top of BloodHound CE☆34Updated last year
- ☆52Updated last year
- AutoPoC Generator HoneyPoC☆35Updated 2 months ago
- Script written in python to perform Resource-Based Constrained Delegation (RBCD) attack by leveraging Impacket toolkit.☆21Updated 4 years ago
- self-hosted Azure OSINT tool☆31Updated 3 weeks ago